Topic navigation

Blog Articles

Integration of API management details (Part 4)

In Part 3 of this series, we started diving into the details that determine how your integration becomes the key to transforming your customer experience.

It started with laying out the process of how I’ve approached the use case by researching successful customer portfolio solutions as the basis for a generic architectural blueprint. Now it’s time to cover various blueprint details.

This article takes you deeper into specific elements (API management and reverse proxy) of the generic architectural overview.

Architectural details

As mentioned before, the architectural details covered here are based on real customer integration solutions using open source technologies. The elements presented here are then the generic common architectural elements that I’ve identified and collected in a generic architectural blueprint. It’s my intent to provide a blueprint that provides guidance and not deep technical details.

This section covers the visual representations as presented, but it’s expected that they’ll be evolving visually over time. There are many ways to represent each element in this architectural blueprint, but I’ve chosen icons, text, and colors that I hope are going to make it all easy to absorb. Feel free to post comments at the bottom of this post, or contact me directly with your feedback.

Now let’s take a look at the details in this architecture and outline the elements uncovered in my research.

Everything you need to grow your career.

API management

Gateways into an organization are split between managing API access and hiding the actual landscape behind accessing services in the organization. The first element I identified was a management platform for handling API gateway activities.

API management refers to how access is provided to an organization’s services. It’s the critical path for access internally to services as well as externally.

Other applications (providing access to aggregated microservices or other internal applications)

Part of the process of eventual access from external parties to internal services through interfaces involves hiding the specific networking details. To do this, we’ll examine reverse proxies details.

Reverse proxies

This covers various solutions found in research, but all are delivering the same functionality.

The basic security is achieved through these proxies, because they are acting on requests from third parties. By retrieving requested resources for their clients, all external parties are prevented from having actual access to internal networks.

Interactions on behalf of their clients provide them access to the following microservices: